Vulnerability Details : CVE-2024-9680
Potential exploit
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0.
Vulnerability category: Memory Corruption
Products affected by CVE-2024-9680
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:131.0:*:*:*:*:*:*:*
CVE-2024-9680 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Mozilla Firefox Use-After-Free Vulnerability
CISA required action:
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
CISA description:
Mozilla Firefox and Firefox ESR contain a use-after-free vulnerability in Animation timelines that allows for code execution in the content process.
Notes:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-9680
Added on
2024-10-15
Action due date
2024-11-05
Exploit prediction scoring system (EPSS) score for CVE-2024-9680
9.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-9680
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-10-09 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2024-10-16 |
CWE ids for CVE-2024-9680
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2024-9680
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1923344
Access DeniedIssue Tracking;Permissions Required
-
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281992
281992 – www/firefox: 0day 9.8 score CVE-2024-9680 upgrade ASAP.Issue Tracking
-
https://www.mozilla.org/security/advisories/mfsa2024-52/
Security Vulnerability fixed in Thunderbird 131.0.1, Thunderbird 128.3.1, Thunderbird 115.16.0 — MozillaVendor Advisory
-
https://www.mozilla.org/security/advisories/mfsa2024-51/
Security Vulnerability fixed in Firefox 131.0.2, Firefox ESR 128.3.1, Firefox ESR 115.16.1 — MozillaVendor Advisory
-
https://lists.debian.org/debian-lts-announce/2024/10/msg00005.html
[SECURITY] [DLA 3914-1] firefox-esr security updateMailing List
-
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49039
CVE-2024-49039 - Security Update Guide - Microsoft - Windows Task Scheduler Elevation of Privilege VulnerabilityNot Applicable;Patch;Vendor Advisory
Jump to